Description
The Booking for Appointments and Events Calendar - Amelia plugin for WordPress is vulnerable to SQL Injection via the `sort` parameter in the payments listing endpoint in all versions up to, and including, 2.1.2. This is due to insufficient escaping on the user-supplied `sort` parameter and lack of sufficient preparation on the existing SQL query in `PaymentRepository.php`, where the sort field is interpolated directly into an ORDER BY clause without sanitization or whitelist validation. PDO prepared statements do not protect ORDER BY column names. GET requests also skip Amelia's nonce validation entirely. This makes it possible for authenticated attackers, with Manager-level (`wpamelia-manager`) access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database via time-based blind SQL injection.
Published: 2026-03-31
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection allowing data exfiltration by authenticated managers
Action: Immediate Patch
AI Analysis

Impact

The Amelia booking plugin for WordPress contains a flaw in its payments listing endpoint. User supplied input in the 'sort' parameter is directly interpolated into an ORDER BY clause without sanitization, creating a classic SQL injection vector. Because PDO prepared statements do not protect column names, an attacker with Manager or higher privileges can add additional SQL statements via the GET request, bypassing nonce validation. The outcome is the ability to perform time‑based blind SQL injection to read sensitive database contents, potentially exposing user data and other confidential information.

Affected Systems

All installations of the Amelia WordPress plugin up to and including version 2.1.2 are affected. The vulnerability applies only to users with Manager-level permissions or higher within WordPress.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate to high severity problem, whereas the lack of an EPSS score leaves the exact likelihood of exploitation unclear. Aside from a lack of inclusion in the KEV catalogue, the flaw is exploitable over the network as a GET request does not trigger any nonce check. Because only administrators or managers can trigger it, the attack requires that the attacker already be authenticated with sufficient privileges, but given the potential to extract important data, the risk remains significant for affected sites.

Generated by OpenCVE AI on April 1, 2026 at 06:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Amelia plugin to the latest available version that removes the vulnerability.
  • After upgrading, test the payments listing endpoint to confirm the 'sort' parameter no longer accepts arbitrary SQL input.
  • Review user role assignments and remove Manager or higher privileges from users who do not require access to payments data.
  • Monitor logs for attempts to use the 'sort' parameter in a manner that deviates from normal usage patterns.

Generated by OpenCVE AI on April 1, 2026 at 06:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ameliabooking
Ameliabooking booking For Appointments And Events Calendar
Wordpress
Wordpress wordpress
Vendors & Products Ameliabooking
Ameliabooking booking For Appointments And Events Calendar
Wordpress
Wordpress wordpress

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description The Booking for Appointments and Events Calendar - Amelia plugin for WordPress is vulnerable to SQL Injection via the `sort` parameter in the payments listing endpoint in all versions up to, and including, 2.1.2. This is due to insufficient escaping on the user-supplied `sort` parameter and lack of sufficient preparation on the existing SQL query in `PaymentRepository.php`, where the sort field is interpolated directly into an ORDER BY clause without sanitization or whitelist validation. PDO prepared statements do not protect ORDER BY column names. GET requests also skip Amelia's nonce validation entirely. This makes it possible for authenticated attackers, with Manager-level (`wpamelia-manager`) access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database via time-based blind SQL injection.
Title Amelia <= 2.1.2 - Authenticated (Manager+) SQL Injection via 'sort' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Ameliabooking Booking For Appointments And Events Calendar
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:38:23.291Z

Reserved: 2026-03-23T17:43:21.055Z

Link: CVE-2026-4668

cve-icon Vulnrichment

Updated: 2026-04-01T12:22:55.332Z

cve-icon NVD

Status : Deferred

Published: 2026-04-01T00:16:01.887

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-4668

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:59:16Z

Weaknesses